TW200901683A - Multi-channel communications protocol - Google Patents

Multi-channel communications protocol Download PDF

Info

Publication number
TW200901683A
TW200901683A TW097108174A TW97108174A TW200901683A TW 200901683 A TW200901683 A TW 200901683A TW 097108174 A TW097108174 A TW 097108174A TW 97108174 A TW97108174 A TW 97108174A TW 200901683 A TW200901683 A TW 200901683A
Authority
TW
Taiwan
Prior art keywords
channel
probability
communication
packet
channels
Prior art date
Application number
TW097108174A
Other languages
Chinese (zh)
Inventor
Peter Key
Ayalvadi Ganesh
Ashvin Lakshmikantha
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of TW200901683A publication Critical patent/TW200901683A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • H04L12/407Bus networks with decentralised control
    • H04L12/413Bus networks with decentralised control with random access, e.g. carrier-sense multiple-access with collision detection [CSMA-CD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • H04W74/08Non-scheduled access, e.g. ALOHA
    • H04W74/0833Random access procedures, e.g. with 4-step access
    • H04W74/0841Random access procedures, e.g. with 4-step access with collision treatment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/02Selection of wireless resources by user or terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

There is a need to improve design of communication protocols in which two or more channels are provided and, optionally, in which collision avoidance is not available. An improved protocol is provided in which communication nodes pick a channel on which to transmit and collision may occur where two nodes attempt to transmit on the same channel. The node currently occupying a channel is arranged to have a specified probability of holding onto that channel as compared to a newcomer. Other methods are described whereby a node is able to occupy more than one channel at the same time and whereby nodes each occupy approximately the same number of channels.

Description

路對高的端對端處理能力 ,對於通訊容量的需求有 通訊網路設備以增加容量 此改進現在所用的現存頻 用在網路上傳送資料的通 ηRoad-to-high end-to-end processing capability, communication capacity needs for communication network equipment to increase capacity. This improvement is now used to transmit data over the network.

.J 200901683 九、發明說明: 【發明所屬之技術領域】 本發明概有關於多重通道通訊協定 【先前技術】 在所有種類的通訊網 低資料傳輸時間的需求下 趨勢。然而若要藉由增建 極為耗時且花費不貲。因 用致率’例如,藉由改進 之設計就變成是必須的。 — 在通訊網路中,一般所提供的是數層的通訊協 言之’通常會使用協定堆疊方法。例如。以高階的 崎些層開始於實體層,其作為與網路基礎結構 承跟隨著資料鏈結層、傳輸層、網路層以及應用層 料鍵結層中,媒體存取控制(Mediuni Access Control 層一般是用於提供(可以是例如)控制對於在一通訊 如區域網路(Local Area Network: LAN)或是其他種 m網路上的實際傳輸媒體之存取。 在以封包為基礎的通訊網路中,資料被塞入被 包的單位中,這裡所說的封包就是依據所使用的通 透過網路傳輸。 大部分現在具有媒體存取控制(MAC)層的通訊 〜般而言在此層上都使用單一通道的方法。然而更 以及降 增高的 ,那將 寬之使 訊協定 定,換 觀點, 面,通 。在資 :MAC) 網路例 類的通 稱為封 訊協定 糸統, 近期的 5 200901683 發展’已經對在MAC層上使用多重通道(multi-channel)進 行過探討。假設能夠進行同時的資料傳輪,這些多重通道 可以被認為是實體通道’要不然就是正交邏輯(orthogonal logic)通道。 【發明内容】 本揭露的簡化結論將提出如下,以對讀者提供一基本 的了解本.發明内容」並不是本揭露的一個廣泛性概觀, 亦非旨在界定本發明的主要/重要元件以及界定本發明的 範圍.本發明内谷J只有一個目的,是以簡化的方式提 出本揭硌的一些觀念,以作為下文中「實施方式」的前言。。 為有需要針對提供二或多個通訊通道並且選擇性的 π # &避S機制的通訊協定設計進行改良,本發明揭 露了改良的通訊協宏· 好. 描疋其中通訊節點選定一通道,並在其上 傳送封包。當二節點當 、 ¥成於同一通道進行傳送時,就會發生 碰撞。相較於新加入的 的ip點’目刖佔有通道的節點被配置為.J 200901683 IX. Description of the Invention: [Technical Field] The present invention relates to a multi-channel communication protocol [Prior Art] A trend under the demand for low data transmission time of all kinds of communication networks. However, it is extremely time consuming and costly to build. The use rate is, for example, made necessary by an improved design. — In a communication network, the general layer of communication protocols are generally provided as a protocol stacking method. E.g. Starting with the high-level singular layer in the physical layer, as the network infrastructure follows the data link layer, transport layer, network layer and application layer key layer, media access control (Mediuni Access Control layer Typically used to provide (may be, for example) control access to actual transmission media over a communication such as a Local Area Network (LAN) or other m-network. In a packet-based communication network The data is stuffed into the packaged unit. The packets mentioned here are transmitted through the network according to the used ones. Most of the communication with the media access control (MAC) layer nowadays is generally on this layer. The method of using a single channel. However, the increase and the increase, it will be wide, the agreement, the point of view, the face, the pass. In the capital: MAC) network category is known as the seal agreement system, the recent 5 200901683 Development 'has been discussed on the use of multi-channels at the MAC layer. Assuming that simultaneous data transfer is possible, these multiple channels can be thought of as physical channels' or otherwise orthogonal logic channels. SUMMARY OF THE INVENTION The simplified conclusions of the present disclosure are set forth below to provide a basic understanding of the present disclosure. The present invention is not an extensive overview of the disclosure, nor is it intended to define the main/critical elements and definitions of the present invention. The scope of the present invention. The present invention has only one purpose and is to present some concepts of the present disclosure in a simplified manner as a preface to the "embodiment" below. . In order to improve the design of a communication protocol for providing two or more communication channels and selective π # & S avoidance mechanism, the present invention discloses an improved communication protocol macro. It is described that a communication node selects a channel, And send the packet on it. Collisions occur when two nodes are transmitted on the same channel. Compared to the newly added ip point, the node that occupies the channel is configured as

C 佔用該通道的一待定播查 疋機率。本發明亦揭露其他方法,其中節 點可以在同一時間伯田 用一個以上的通道,並且每個節點佔用 大約相同數目的通道。 參照附圖以閱靖·&gt; r 項下文之「實施方式」,將更能意會和明 白本發明在此揭露之諸多特徵。 【實施方式】 本「實施方式」 及其附圖之目的是用來敘述本揭露之 6 200901683 示例,而非旨在 一形式。本「實 作此示例的一系 列步驟可以由不 代表本揭露的示 施方式」說明示 列步驟。然而相 同的示例來完成 例所可被建構或 例的功能,以及 同或是等效的功C occupies a pending broadcast probability of the channel. The present invention also discloses other methods in which nodes can use more than one channel at the same time, and each node occupies approximately the same number of channels. The features of the invention disclosed herein will be more apparent and apparent from the following description of the <RTIgt; [Embodiment] The "Embodiment" and the accompanying drawings are intended to describe the example of the present invention, and are not intended to be a form. This "a series of steps to implement this example can be illustrated by a means that does not represent the disclosure". However, the same examples are used to complete the functions that can be constructed or exemplified, as well as the equivalent or equivalent work.

雖然本揭露的示例是以無缘地 方式描述及顯示,然而所描述的方 如那些熟知該項技藝者所會領會的 很多種不同種類的通訊網路。 存取通訊網路 法僅為示例而 ’本揭露的示Although the examples of the present disclosure are described and displayed in a singular manner, the described methods are as many different types of communication networks as those skilled in the art will appreciate. The access communication network method is only an example and the disclosure of the present disclosure

本文所述方&amp;旨在#為一通訊協定的部分來 中提供了兩個或更多個通道(請參照下面更多有 這個名詞的討論),並且可以選擇避免碰撞是否要 撞的避免涉及了主動式感測或探測,以判定通道 碌或是仍有容量可以使用,此步驟需要額外的資 用。本文所述方法係用在並沒有提供這類主動感 撞避免的偵測。例如,在無線存取通訊網路中,一 對用在MAC層的通訊協定而言,都不會有碰撞遥 然而這只是一個示例,在不同層上有很多通訊協 其上也不需要或沒有提供碰撞避免。舉例而言, 學波分多工網路(optical wavelength division network)上即是如此。當在本文所述方法用在不 避免的通訊協定時,就能產生良好的效益。儘管 本文所方法用在有提供碰揸避免的通訊協定時, 某些效益。 使用的唯 建構並運 能以及系 為實施的 非限制。 例適用於 實施,其 關於通道 提供。碰 是否為忙 源才能作 測或對碰 _般而論, i免可用。 定,並且 通常在光 multiplex 提供碰撞 如此,但 也能獲得 系统的示例 7 200901683 第1圖顯示巧是可以實施本文所述之通訊協定之通訊 網路的示意圖。它至少包含複數通訊終端(communication terminal)103,其與通訊網路100的基地台102是以無線通 訊的方式進行通訊。此處所提通訊終端可以是任何適合種 類者,例如行動電話、膝上型電腦(laptop computer)、個 人數位助理(personal digital computer)以及諸如此類者。 通訊網路I 〇 〇至少包含節點i 0 i,其為任何適當的通訊鏈 結所互連者,其中的通訊鏈結可以是實體鏈結(physical link)或是無線鍵結(wireless link)。第1圖的通訊網路可以 至少包含更多通訊終端1〇3、基地台1〇2以及節點1〇1,其 標示在圖式中的方式’只是要讓解釋更為清楚易懂。 在通訊終端1 0 3以及基地台1 〇 2之間的通訊是利用習 知技術所知的適當之通訊協定連同此處所描述的特定協定 一起使用。例如此處所描述的協定可以在協定堆疊的一個 層上實施,其中該堆疊至少包含其他協定。要實施在此描 述的協定,也可以利用現存的通訊協定並將其修改,以使 U 其符合在此揭露中描述的通訊協定之需求。例如現存的通 訊協定可以是廣泛使用的IEEE8〇2 u無線MAC協定。然 而這並不是基本必須的’任何適當的通訊協定都可以被使The parties described in this article are intended to provide two or more channels for a portion of a communication protocol (please refer to the discussion below for more of this term) and may choose to avoid collisions to avoid collisions. Active sensing or probing to determine if the channel is full or there is still capacity available, this step requires additional capital. The methods described herein are used to provide such active collision avoidance detection. For example, in a wireless access communication network, a pair of communication protocols used at the MAC layer will not collide. However, this is only an example. There are many communication protocols on different layers that are not needed or provided. Collision avoidance. This is the case, for example, on an optical wavelength division network. Good benefits can be obtained when the methods described herein are used in unavoidable communication protocols. Although the method of this paper is used in communication protocols that provide collision avoidance, certain benefits. The use of construction and capacity and the implementation of the non-restricted. The example applies to the implementation, which is provided on the channel. Whether it is a busy source can be measured or confronted. In general, i is free. And, in general, the optical multiplex provides collisions, but examples of the system are also available. 7 200901683 Figure 1 shows a schematic diagram of a communication network that can implement the communication protocol described herein. It includes at least a plurality of communication terminals 103 that communicate with the base station 102 of the communication network 100 in a wireless communication manner. The communication terminal mentioned herein can be any suitable type, such as a mobile phone, a laptop computer, a personal digital computer, and the like. The communication network I 〇 〇 contains at least a node i 0 i , which is interconnected by any suitable communication link, wherein the communication link can be a physical link or a wireless link. The communication network of Figure 1 can contain at least more communication terminals 1〇3, base station 1〇2, and node 1〇1, which are shown in the diagram 'just to make the explanation clearer and easier to understand. The communication between the communication terminal 103 and the base station 1 〇 2 is used in conjunction with the specific protocols described herein using appropriate communication protocols known to the prior art. For example, the protocol described herein can be implemented on one layer of a stack of agreements, where the stack contains at least other agreements. To implement the agreements described herein, it is also possible to utilize existing protocols and modify them to conform U to the requirements of the communication protocols described in this disclosure. For example, existing communication protocols may be the widely used IEEE 8 〇 2 u wireless MAC protocol. However, this is not essential. Any appropriate communication protocol can be

8 200901683 10 3要把資料轉送到基地台10 2的狀況然而此發明並不只 限於f傳冑結n兄,下載鍵結的狀況將會在後面㈣ 的内今中插述。另外,本發明也不限於MAC層的通訊。 • 本發明所提供的通道數目可多於尋求與同一指定的基 地口進行通訊的通訊終端(在此揭露中也被稱為使用者), 例如通訊通道的數目,可以是關於一個特定基地台的通訊 終端103數目的兩倍或兩倍以上,然而這並不是必然需要 〇 如此的,也有可能使用的通訊通道數目比通訊終端數目為 少〇 本發明所提供的通訊通道可以是任何適當的形式,例 如’這些所提供的通道可以是使用分頻的;換言之,使用 不同的頻帶(frequency band),其可以同時進行資料傳輪 者。另一個選項是利用槽化分割方法(sl〇tted approaeh)提 供通道,例如使用分時多工或分碼多工或分時與分碼多工 的結合。分頻多工和分時多工的結合以及/或分碼多工也可 以被使用在,例如在正交分頻多功(orth〇g〇nal_frequency 〇 division multiplexing: OFDM)中。OFDM 已經在 Tse and Viswanath所著,劍橋大學於2005年出版的”Fundanientals of Wireless Communication” 中,有描述其細節。 在分時多功下’一個較大的時期,稱為框(fraine),被 分成固定數目的小槽(mini-slot)。每一個通訊終端取用一 個特定小槽,並指在該小槽内傳輸資料。藉此,這些通訊 終端的傳輸可以被個別分辨出來,並且被有效率地在不同 的通道上傳輸。在編號ISBN -1 0-0 1 32009161,1991年出 9 200901683 版,Bertselkas 與 Gallager 所著的”Data Networks”第二版 中,已經有詳細的描述。8 200901683 10 3 The situation of transferring the data to the base station 10 2 However, the invention is not limited to the f-bringing, and the status of the download key will be inserted in the later (4). In addition, the present invention is not limited to communication at the MAC layer. • The number of channels provided by the present invention may be greater than the number of communication terminals (also referred to herein as users) seeking to communicate with the same designated base port, such as the number of communication channels, which may be for a particular base station. The number of communication terminals 103 is twice or more than twice, but this does not necessarily require such a limitation. It is also possible to use fewer communication channels than the number of communication terminals. The communication channel provided by the present invention may be in any suitable form. For example, 'these channels provided may be frequency-divided; in other words, different frequency bands are used, which can simultaneously perform data traversers. Another option is to provide channels using the slotted split method (sl〇tted approaeh), for example using time division multiplexing or code division multiplexing or combining time division with code division multiplexing. A combination of frequency division multiplexing and time division multiplexing and/or code division multiplexing may also be used, for example, in orth〇g〇nal_frequency 〇 division multiplexing: OFDM. OFDM has been described in Tse and Viswanath, and the details are described in the "Fundanientals of Wireless Communication" published by the University of Cambridge in 2005. Under time-sharing, a larger period, called a frine, is divided into a fixed number of mini-slots. Each communication terminal takes a specific small slot and refers to transmitting data in the small slot. Thereby, the transmissions of these communication terminals can be individually distinguished and efficiently transmitted on different channels. It has been described in detail in ISBN No. 1-0-0 1 32009161, 1991, 9 200901683, in the second edition of "Data Networks" by Bertselkas and Gallager.

U 在分頻多功下,每一個通訊終端使用一個獨特的偽雜 訊序列(Pseud〇 noise sequence: PN sequence),並藉由 PN 序列將訊號(資料)擴展到一個大很多的頻寬上進行傳輸。 藉由知道該擴展所用的序列,即使有多個通訊終端同時傳 輸資料,一接收端亦能夠將由所有通訊終端來的資料解 碼,。對資料傳輸而言,每一個PN序列或碼都可以被想 成是一個個別的通道。分碼多工的更多細節,在 Bertossi 以及 Bonuccelli 在 IEEE 期刊 Transaction . on Communication 上發表的文章 “Code assignment for hidden terminal interference avoidance in multihop packet radio network” ’ 3(4):441449 &gt; 1 99 5年8月印行。分碼多工也可 以用在行動通訊網路(ad hoc network),如2003年6月的 行動通訊網路與計算的國際會議之會議紀錄(MOBIHOC03) 第 1 53 163 頁中 Muqattash 以及 Marwan“CDMA based mac protocal for wireless ad hoc network”戶斤述 0 示例性方法 對於改良式的多通道MAC協定,其第一個示例將在 下面參照第2圖而加以描述。要實施此方法,可以單獨靠 通訊網路上的複數節點(n〇de),例如第1圖中的通訊終端 103而達成。每一個通訊終端1〇3都有某個數量的資料需 要傳輸到基地台1 0 2 (也可以稱為通訊網路1 〇 〇的存取 點),此資料的數量可以是單獨的一個資料檔案,或是其他 10 200901683 任何適當種類的片段資料。以任何在習知技術中適合的方 法,把這樣的資料形成封包,並且依據其使用的機制之種 類而提供通道。針對特定資料檔案或其他資料片段,在一 特定通道上藉由通訊終端1 03傳輸資料封包的一集合稱為 一封包流(a flow of packet)。U In the crossover multi-function, each communication terminal uses a unique pseudo-noise sequence (Pseud〇noise sequence: PN sequence), and the signal (data) is extended to a much larger bandwidth by the PN sequence. transmission. By knowing the sequence used for the extension, even if multiple communication terminals simultaneously transmit data, a receiving end can decode the data from all communication terminals. For data transmission, each PN sequence or code can be thought of as an individual channel. More details on code division multiplexing, in the article "Code assignment for hidden terminal interference avoidance in multihop packet radio network" by Bertossi and Bonuccelli in the IEEE Journal Transaction. on Communication 3(4):441449 &gt; 1 99 5 Printed in August. Code division multiplexing can also be used in ad hoc networks, such as the June 2003 meeting of the International Conference on Mobile Communications and Computing (MOBIHOC03), page 1 53 163, Muqattash, and Marwan “CDMA based mac”. Protocal for wireless ad hoc network" Exemplary Method For an improved multi-channel MAC protocol, a first example thereof will be described below with reference to FIG. To implement this method, it can be achieved by a plurality of nodes (n〇de) on the communication network, such as the communication terminal 103 in Fig. 1. Each communication terminal 1〇3 has a certain amount of data to be transmitted to the base station 1 0 2 (which may also be referred to as an access point of the communication network 1 ,), and the amount of this data may be a single data file. Or other 10 200901683 any suitable kind of clip material. Such data is packaged in any suitable manner in the prior art and provides access based on the type of mechanism in which it is used. A set of data packets transmitted by the communication terminal 103 on a particular channel for a particular data file or other piece of data is referred to as a flow of packet.

先前的 MAC協定,已經對單一資料封包而不是資料 封包流的傳輸作了最佳化。換言之,在MAC層中,並不 存在有資料封包流或是資料封包的集合的概念,而是只有 在較高的層,例如傳輸、網路或是應用程式層中,才會有 此概念。然而如本文所指出者,大部分的資料傳輸或資料 交換,是以流(flow)為基礎的,並且這也是本文所述方法 所加以利用者。 接下來描述第2圖的方法,以作為在一通訊終端103 上執行之示例性方法,其中該示例性方法尋求對基地台 1 02或其他通訊網路節點更新一資料檔案或其他資料片 段。此方法可以在現今的所有通訊終端1 〇 3的任何一種上 實施,但為了簡明起見,現在所描述的,只對單一的通訊 終端1 0 3描述以作為示例。通訊終端1 〇 3選擇(方塊2 0 0) 通道以於其上傳輸其封包流,此封包流就是把資料檔案分 割所得者。這種選擇可以是隨機性的,也可以用偽隨機演 算法(pseudo random algorithm),或是任何其他適合的方式 而獲得者。在選擇時並不知道這些通道在當下的狀態 (s t a t e),例如這些通道當下是否忙祿(b u s y)或是閒置(i d 1 e)。 通訊終端 1 0 3嘗試傳輸封包通過該選定的通道(方塊 11 200901683The previous MAC protocol has optimized the transmission of a single data packet rather than a data packet flow. In other words, in the MAC layer, there is no concept of a data packet stream or a collection of data packets, but only in higher layers, such as transport, network, or application layers. However, as noted herein, most of the data transfer or data exchange is based on flow, and this is also the use of the methods described herein. Next, the method of FIG. 2 will be described as an exemplary method performed on a communication terminal 103 that seeks to update a data archive or other data segment to a base station 102 or other communication network node. This method can be implemented on any of the present communication terminals 1 〇 3, but for the sake of brevity, what is described now, only a single communication terminal 103 is described as an example. The communication terminal 1 〇 3 selects (block 2 0 0) the channel on which to transmit its packet stream, which is the result of dividing the data file. This choice can be random, or it can be obtained using a pseudo random algorithm or any other suitable method. The choice of these channels in the current state (s t a t e), such as whether these channels are busy (b u s y) or idle (i d 1 e). Communication terminal 1 0 3 attempts to transmit the packet through the selected channel (box 11 200901683

201),並且對於是否會發生碰撞作一評估,若通訊終端103 在一特定期限内有接收到關於其所傳送出去的封包已經被 對方收到的確認訊息(Acknowledgement message: ACK message)時,則假設為沒有碰撞發生。此類的ACK message 在此後都稱為第一 ACK訊息’藉以將此訊息和此處理過程 中較後面所接收到的其他ACK訊息作區別。在此例中,通 訊終端1 03移動到通道擁有狀態(方塊204),並於此狀態 中持續將其封包流以一定程度的持續(persistence)在此通 道上送出。可藉由改變一些參數值調整這個持續的程度(或 稱「黏著率(stickness)」),其細節將在下面詳細描述。 這個關於評估碰撞是否發生的特定時間限制在此稱為 時間槽(time si〇t),其長度足夠讓通訊終端傳輸單一封包 到基地台’並收到此狀況下回送的確認訊息。在一解說性 的實例中’前述時間槽的長度在每個通訊終端1 〇3上都是 相同的’且為視要用的應用程式之方案而分別確定。例如, 在·,..、線 ϋ 域網路中(Wireiess Local Area Network: WLAN) ’時間槽長度為依據每個通道的頻寬、封包最大尺 寸以及最大傳輸範圍(或節點間最大距離)而定。在實際運 作中前述數值是藉由先前送出測試封包,進行估計或計 算而在實際通訊前先行得到,或是在該方法使用當中持續 監視該方法本身的使用情況,或是使用任何其他適當的方 法而得到者。 如果在該特定時間當中沒有收到ACK訊息,就會假設 有碰撞發生。例如當所選定的通道已經是忙碌日夺,不止將 12 200901683 要進行傳輸的封包’連已是忙碌的該通道上的封包’都將 會被丟棄。在這狀況下’此通訊終端103(方塊203)在重複 步驟選擇通道(方塊2〇〇)與嘗試傳輸封包通過該選定的通 道(方塊2 0 1)之前等待一特定時間。此特定的等待時間可 以是隨機的時間長度’例如’時間槽長度的整數倍’且該 整數數值是隨機(或是偽隨機)的。若等待時間是零或是固 定的,則通訊終端103可能會在方塊202上重複遇上碰撞。201), and if an evaluation is made as to whether a collision will occur, if the communication terminal 103 receives an acknowledgement message (Acknowledgement message: ACK message) that the packet transmitted by the communication terminal has been received by the other party within a certain period of time, Assume that no collisions have occurred. Such an ACK message is hereinafter referred to as a first ACK message&apos; to distinguish this message from other ACK messages received later in the process. In this example, the communication terminal 103 moves to the channel possession state (block 204), and in this state continues to send its packet stream over the channel with a certain degree of persistence. The extent of this persistence (or "stickness") can be adjusted by changing some of the parameter values, the details of which will be described in detail below. This specific time limit for assessing whether a collision has occurred is referred to herein as a time slot, which is long enough for the communication terminal to transmit a single packet to the base station&apos; and receive a confirmation message sent back in this condition. In an illustrative example, the length of the aforementioned time slot is the same on each communication terminal 1 〇 3 and is determined separately for the solution of the application to be used. For example, in the Wires Local Area Network (WLAN), the time slot length is based on the bandwidth of each channel, the maximum size of the packet, and the maximum transmission range (or the maximum distance between nodes). set. In actual operation, the aforementioned values are obtained by sending out test packets, estimating or calculating them before the actual communication, or continuously monitoring the usage of the method itself during use of the method, or using any other suitable method. And get it. If no ACK message is received during that particular time, a collision is assumed. For example, when the selected channel is already busy, not only the packet that is to be transmitted, but also the packet on the channel that is already busy will be discarded. In this case, the communication terminal 103 (block 203) waits for a specific time before repeating the step selection channel (block 2 〇〇) and attempting to transmit the packet through the selected channel (block 2 0 1). This particular latency may be a random length of time 'e.g., an integer multiple of the length of the time slot' and the integer value is random (or pseudo-random). If the waiting time is zero or fixed, the communication terminal 103 may repeatedly encounter a collision at block 202.

在一實施例中,方塊203上的隨機等待時間之產生, 至少包含一個方法,其在每一個時間槽結束的時間點上, 以機率α的值,決定離開等待階段,其中α的值是可以調 整的。對於負載低於50 %的輕負載網路而言,通道釋放機 率的值Ρ可以設為ρ = 〇·1,並且通道選定嘗試機率α的值, 可以設為&lt;2=0.5。若是負載量為75 0/〇的中等負載網路,ρ 的值可以設為ρ = 〇.〇5,而〇;的值可以設為α=〇2β該機率 (¾在此稱為通道選定嘗試機率(channej seiecti〇n attenipt probability) 〇 旦通訊終端103進入通道擁有 如上所述的 204則其以—定程度的流程持續性,在該選定的通道上持 續將其封包流中的&amp;播、笔 甲的封包傳送出去。方塊20 5監控該封包流 或疋該已收集的資jfejj +» J&gt;L· 衆幻貝科封包的傳送是否已經完成。例如封&amp; 流的封包可以妯” 1 破標不以封包流辨識碼(flow identifier),使 得偵測何時封句、、兵质+ m '丨傳达70畢成為可能。換言之,只要經 一段特定時間之後, 段注意δ不再有需要傳送的封包時,勒 能夠偵測到封自、·今徨 ^ 流傳达元畢的時間點。除上述的方法之 13 200901683 外,任何其他適合用於偵測何時完成傳送的方法都可以使 用。一旦傳送是完成,此方法結束(方塊 2 06)於整個資料 檔案完成傳送的時間點上。否則通訊終端繼續傳送封包流 的封包於該選定的通道(方塊207)上,直到假設其中有碰 撞發生(方塊208)。例如第三方的某通訊終端103嘗試要 在同一通道上傳送,則碰撞可能會發生。 若在該特定時期内沒有收到該ACK訊息,則使用和方 f 1 塊202相同的方式,假設有發生碰撞。凡是屬於此處所指 的種類之ACK訊息,下文皆稱為第二ACK訊息,藉以區 別和方塊2 0 2相關所接收到的A C K訊息。若碰撞假設已發 生,此通訊終端以機率p(方塊209和方塊210)放棄該選定 通道(方塊211),此處的機率p的值是可以調整的,藉以調 整上述的黏著率(stickness)」或「流程持續(persistence)」 的程度。月!j述的「通道釋放機率(channel release probability)」這個詞是用來指機率p的意義,藉以區別於 通道選定嘗試機率α。 (J 機率Ρ的任何適當的值都可以使用,例如若ρ= 1 ,封 包流就是流程持續,直到發生碰撞為止。在此時點上,他 們總是會停止。在另外一個示例中,若ρ = 〇則在通訊終端 103發生通道捕獲,一旦進入通道擁有狀態,就會一直維 持在該狀態,直到其傳輸完成為止。這是典型地可使用之 情況’其中在同一特定時間内,通道的數目大於嘗試要存 取同一媒體之通訊終端的數目。 在一些實施例中’通道釋放機率Ρ被安排的值,是要 14 200901683 使得已經成功地在一通道上正進行傳送的通訊基地台,有 高的機率掌握著該通道,而使得新來者傾向於放棄此通 道,並且嘗試使用新通道,藉由把小的正數值給予通道釋 放機率 P,即可以達成前述目的。前述目的之表達方式也 可以說成是:一通道現存的佔有者佔有該通道的機率,比 新來者高出很多。In an embodiment, the generation of the random waiting time on block 203 includes at least one method for determining the leave waiting phase at the time point of the end of each time slot, wherein the value of α is ok. Adjusted. For lightly loaded networks with less than 50% load, the value of the channel release probability can be set to ρ = 〇·1, and the value of the channel selection attempt probability α can be set to &lt;2=0.5. In the case of a medium load network with a load of 75 0/〇, the value of ρ can be set to ρ = 〇.〇5, and the value of 〇; can be set to α = 〇 2β. This probability (3⁄4 is called channel selection attempt) Probability (channej seiecti〇n attenipt probability) Once the communication terminal 103 enters the channel, as described above, 204, with a certain degree of process continuity, continuously keeps &amp; broadcast in its packet stream on the selected channel. The packet of the pen is transmitted. Block 20 5 monitors whether the packet flow or the collected jfejj +» J&gt;L· the transmission of the Fantasy Beco packet has been completed. For example, the packet of the &amp; stream can be 妯" 1 The break is not based on the flow identifier, so that it is possible to detect when the sentence is sealed, and the mass + m '丨 conveys 70. In other words, as long as after a certain period of time, the segment notices that δ is no longer needed. When transmitting the packet, Le can detect the time point of the transmission and the current transmission. In addition to the above method 13 200901683, any other method suitable for detecting when the transmission is completed can be used. Once the transfer is complete The method ends (block 06) at the point in time when the entire data file is transmitted. Otherwise, the communication terminal continues to transmit the packet of the packet stream to the selected channel (block 207) until it is assumed that a collision has occurred (block 208). If a communication terminal 103 of a third party attempts to transmit on the same channel, a collision may occur. If the ACK message is not received within the specific period, the same method as the block f 1 block 202 is used, assuming Collision occurs. Any ACK message belonging to the category referred to here, hereinafter referred to as the second ACK message, is used to distinguish the received ACK message from block 2 0 2. If the collision hypothesis has occurred, the communication terminal takes the probability p (Block 209 and block 210) discard the selected channel (block 211), where the probability p value can be adjusted to adjust the above-mentioned stickiness or "persistence". The term "channel release probability" is used to refer to the meaning of the probability p, which is different from the channel selection attempt probability α. Any appropriate value for the rate can be used. For example, if ρ = 1, the packet flow is the process until the collision occurs. At this point, they will always stop. In another example, if ρ = 〇 Channel capture occurs at the communication terminal 103, and once it enters the channel possession state, it remains in that state until its transmission is completed. This is typically a case where 'the number of channels is greater than the attempt at the same specific time The number of communication terminals accessing the same media. In some embodiments, the 'channel release probability Ρ is set to a value of 14 200901683 so that the communication base station that has successfully transmitted on one channel has a high probability of mastering the channel, making the newcomer tend to By abandoning this channel and attempting to use the new channel, the aforementioned purpose can be achieved by giving a small positive value to the channel release probability P. The expression of the aforementioned purpose can also be said to be: the probability that an existing occupant of one channel possesses the channel is much higher than that of the newcomer.

依循第2圖所描述的方法,兩個通訊終端要同時進入 同一個通道的通道擁有狀態是不會發生的,因為在方塊 202將發生碰撞。更不可能發生的是,一個以上的通訊終 端1 0 3同時認為它擁有同一個通道,然後方塊2 0 9的一正 值之通道釋放機率將允許一個或兩個通道都放棄所有權。 例如,通道錯誤或是通道間的互擾,在很罕見的情況下, 可能導致兩個通訊終端1 03在同一時間上的狀態成為二者 都具有同一通道的所有權。因此在依據本發明的一些實施 例中,會讓通道釋放機率P具有小的正數值。 參照第2圖之上述方法也可以被認為是一種涉及兩個 類別(c 1 a s s)中的一個類別之封包流的示例。當每一個封包 流抵達進入系統時,會隨機挑出通道,並嘗試於其上傳送。 尚未找到通道以進行傳送的封包流,與已經是通道擁有狀 態的封包流,二者之間的差別於此顯現。封包流可以是二 個類別的其中一個,滿足(satisfied: S)或未滿足 (u n s a t i s f y: U )。每一個封包流進入系統係以類別U的封包 流進入系統,每一個類別S的封包流「擁有」一通道,並 且在每一個時間槽(例如當利用槽化分割方法來提供多重 15 200901683 通道時)中嘗試於該通道上進行傳送。每一個類別 u的 用者以通道選定嘗試機率α嘗試以時間槽與時間槽之間 相獨立的方式,在隨機選取要進行傳送的通道上進行 送。若其成功地在該通道上傳送,則其轉成為類別S的 用者,並且接著擁有該通道。若其後有碰撞發生,則又 成類別U的使用者。當類別S的使用者遭遇碰撞之後, 會以(獨立於其他所有因素之外的)機率ρ轉變成類型U 使用者。 以此方法,在通訊終端之間,會存在有對稱破 (breaking of symmetry),藉此已經獲取通道的通訊終端 其行為就與尚未獲取通道的通訊終端不同。 利用第2圖的方法,使得對於每一個通訊端提供一 可以於其上傳送的通道成為可能。此即最大化了系統穩 性,並且改進了可使用的通訊頻寬之使用效率。另外, 需要的較高階資訊是最少的,而且協定是分散式的,例女 不需要任何集中化的排程器(scheduler)。藉此方法,有 於一整個封包流的延遲或傳送時間都可以獲得改善。 另一示例性方法 上述參照第2圖的方法可以被想成是尋求對每一個 訊終端103提供一個供其進行傳送的單一通道。在另外 個實施例中,必須讓每一個通訊終端1 〇 3在同一時間上 能夠在一個以上的通道進行傳送。當通訊通道數目大於 訊終端1 03的數目的時候便顯現出它的優點,這樣的實 例將在下文中參照第3圖描述。 使 互 傳 使 變 將 的 缺 個 定 所 Γ 9 關 通 通 施 16According to the method described in Fig. 2, it is not possible for the two communication terminals to enter the channel ownership state of the same channel at the same time, because a collision will occur at block 202. What is even more unlikely is that more than one communication terminal 1 0 3 also considers that it has the same channel, and then a positive channel release probability of block 2 0 9 will allow one or both channels to abandon ownership. For example, channel errors or mutual interference between channels, in rare cases, may cause the two communication terminals 103 to have the same channel ownership at the same time. Thus, in some embodiments in accordance with the present invention, the channel release probability P will have a small positive value. The above method with reference to Fig. 2 can also be considered as an example of a packet flow involving one of the two classes (c 1 a s s). As each packet stream arrives into the system, the channel is randomly picked up and attempted to be transmitted on it. The difference between the packet stream that has not been found for transmission and the packet stream that is already in the channel possession state is different. The packet stream can be one of two categories, satisfied: S or unsatisfied (u n s a t i s f y: U ). Each packet stream enters the system and enters the system with a packet stream of category U. Each packet stream of category S "owns" a channel and is in each time slot (for example, when using slotted segmentation to provide multiple 15 200901683 channels) In the attempt to transfer on this channel. The user of each category u attempts to transmit on the channel to be transmitted randomly by the channel selection attempt probability α in a manner independent of the time slot and the time slot. If it successfully transmits on the channel, it becomes the user of category S and then owns the channel. If a collision occurs later, it is again a user of category U. When the user of category S encounters a collision, it will be converted to a type U user with a probability ρ (other than all other factors). In this way, there is a breaking of symmetry between the communication terminals, whereby the communication terminal that has acquired the channel has a different behavior from the communication terminal that has not acquired the channel. With the method of Fig. 2, it becomes possible to provide a channel on which each communication terminal can be transmitted. This maximizes system stability and improves the efficiency of the communication bandwidth that can be used. In addition, the higher order information required is minimal, and the agreement is decentralized, and the female does not need any centralized scheduler. By this means, the delay or the transmission time of an entire packet stream can be improved. Another Exemplary Method The method described above with reference to Figure 2 can be thought of as seeking to provide each communication terminal 103 with a single channel for transmission. In another embodiment, each communication terminal 1 〇 3 must be capable of transmitting on more than one channel at the same time. When the number of communication channels is larger than the number of terminals 203, its advantages are revealed, and such an example will be described later with reference to FIG. Let the mutual transmission make the change of the ninth

200901683 第3圖與第2圖相同,除了等待方塊203因為 丟銅板步驟而描述得較詳細之外。其中,該丟銅板 丟一枚銅板(方塊300),顯示人頭那一面的機率為 選定嘗試機率),以及若獲得顯示的那一面為人頭, 到方塊2 0 0。以上所述即為可以用來實施第2圖的 塊203之方法的一個示例,主要是以持續丟一個銅 到出現人頭為止。此處所說的並不是要真的丟銅板 只要能獲得兩種可能結果的任何隨機程序(或偽隨^ 便可使用。 第3圖與第2圖不同的地方還有在進入通道擁 的時候,通訊終端也能夠依照迴圈同時重新進入第 的等待方塊2 0 3之相等部驟。以此方式,通訊終端 入同時有複數通道的通道擁有狀態,例如假設曾經 方塊 2 0 2,並且推論上沒有發生碰撞,通訊終端繼 到進入通道擁有狀態(方塊204),並且同時也進行 3 00。在方塊3 00的後續上,對兩個可能的結果作出 擇,並且依據此結果,在方塊200上選取了另一個 在該被(方塊201)選取的通道上,有嘗試要進行傳 且若推論沒有碰撞發生,則此程序進行到通道擁有; 塊2 04)。依此方法,通訊終端能夠進入一個以上的 通道擁有狀態。然後來自相同資料流的封包可以利 通道擁有狀態的通道同時送出,以進行該傳送。在 況下,特別是當通道數目比進行上傳的通訊基地台 多時,上一段所述的情形可能是比較有效率的方式 包含一 步驟係 α (通道 則進行 等待方 板,直 ,而是 I程序) 有狀態 2圖中 能夠進 達到過 續進行 到方塊 隨機選 通道。 送,並 欠態(方 通道之 用所有 一些情 數目為 17200901683 Figure 3 is the same as Figure 2 except that block 203 is described in more detail because of the copper plate removal step. Among them, the lost copper plate loses a copper plate (block 300), showing the probability of the side of the head being the selected probability, and if the side that is displayed is the head, to the block 200. The above is an example of a method that can be used to implement block 203 of Figure 2, primarily by continuously dropping a piece of copper until a human head appears. What is said here is not to be able to really lose any copper plate as long as it can get two possible results (or pseudo-can be used ^. The difference between Figure 3 and Figure 2 is when entering the channel, The communication terminal can also re-enter the equal part of the waiting block 2 0 3 according to the loop. In this way, the communication terminal enters the channel having the plurality of channels at the same time, for example, assuming that the block is 2 0 2, and there is no inference In the event of a collision, the communication terminal proceeds to enter the channel possession state (block 204) and also performs 300. At the subsequent occurrence of block 300, two possible outcomes are selected and, based on the result, selected at block 200. On the other channel selected by the block (block 201), there is an attempt to transmit and if no inference occurs, the program proceeds to the channel; block 2 04). In this way, the communication terminal can enter more than one channel possession state. The packets from the same data stream can then be sent simultaneously to the channel with the status of the channel for the transfer. Under the circumstance, especially when the number of channels is more than the number of communication base stations for uploading, the situation described in the previous paragraph may be a more efficient way to include a step system α (the channel is waiting for the square board, straight, but I Program) In the state 2 picture, it can be advanced to the block random selection channel. Send, and understate (the use of all channels for the channel is 17

200901683 下文將說明與第 3圖的方法類似的另一個方法的示 例: 在每一個時間槽中,藉由傳送一個封包於隨機選取的 通道上,每一個通訊終端嘗試獲得一新通道,其機率為 α(通道選定嘗試機率)。若此傳送是成功的,則此通訊終端 現在「擁有j該通道,否則就放棄。此外,對於遭遇到碰 撞之每一個由通訊終端所擁有的通道,這樣的通道具有一 放棄機率 ρ(通道釋放機率),其獨立於所有其他通道。一 替代的方法允許在k個通道上都遭遇碰撞的通訊終端能精 確地放棄kp個通道(kp是一個整數)。否則,通訊終端若 不是放棄[kp]個就是[kp] + l個通道,其機率是被選取的kp 個通道的平均值,其中[kp]指的是kp的整數部分。 另一示例性方法 第4圖也與第3圖相同,除了方塊3 00與301於此變 成方塊400,其代表依據碰撞的歷史記錄被安排來等待一 段時間的一個程序。在參照第3圖所描述的方法中,一單 一通訊終端有機會進入一個以上的通道的通道擁有狀態。 以高階的術語來說,若最近並未推論傳送現有資料流時發 生碰撞,則安排方塊4 0 0的等待程序為等待一段短時間。 若最近的推論有碰撞發生,則等待時間會被增加,且若最 近的推論有更多個碰撞發生,則等待時間又會更進一步增 加。在一些示例中,等待時間的增加可以達到一個特定的 最大值。等待時間與推論的碰撞歷史記錄之間的關係可以 是任何適當的關係,例如線性、或是指數' 或是其他特定 18 200901683 的關係。等待時間的實施可以是如上文中參 的方法,依據一特定通道選定嘗試機率所得 的一隨機選擇。 藉此方式,第4圖所相關的方法,使得 能夠同時”擁有”一個以上的通道,但是依據 史記錄,通訊終端必須放棄嘗試擁有一個以 第4圖的方法之_個示例將在下面揭露 通訊終端i維持其本身的值於ar新的 初始化成amax,並在每一個時間槽中,嘗試 新通道。若成功就將α;重設成ctmax’並且接4 若此嘗試導致碰撞發生,則通訊終端i把oti 者中數值比較大者:ai/2或amin。通訊終端i 有而且其中有遭遇碰撞的通道,其機率是恆 並且這與此通訊終端對其他通道的決定是獨 在第3圖與第4圖的方法中,一個通訊 間點上,可以擁有一個以上的通道,這些方 排來確保每一個通訊終端「擁有」數目大約 在另一方面,也可以讓這裡有差別產生,以 終端(例如那些頂級服務)能夠比那些經濟級 端擁有比較多的通道數目。 在此例中所描述的方法之實施方式係 IEEE802.il無線MAC協定而得到的,其中 際封包傳送的非必要性之要求送出/可以ΐ request to send/clear to send)機制可以是關 照第3圖所述 之二特定結果 一個通訊終端 推論的碰撞歷 上的通道。 訊終端i把ai 以機率CM獲得 I擁有該通道。 重設為下列二 也放棄其所擁 定的機率P, 立的。 終端在同一時 法也可以被安 相等的通道。 使得一些通訊 服務的通訊終 藉由修改標準 優先性高於實 I 出(RTS/CTS: 掉的。若碰撞 19 200901683200901683 An example of another method similar to the method of Figure 3 will be explained below: In each time slot, each communication terminal attempts to acquire a new channel by transmitting a packet on a randomly selected channel, the probability of which is α (channel selection attempt probability). If the transmission is successful, the communication terminal now "owns the channel, otherwise it gives up. In addition, for each channel that is encountered by the communication terminal that encounters the collision, such a channel has a probability of abandonment ρ (channel release Probability), which is independent of all other channels. An alternative method allows communication terminals that encounter collisions on k channels to accurately discard kp channels (kp is an integer). Otherwise, if the communication terminal does not give up [kp] One is [kp] + l channels, the probability is the average of the selected kp channels, where [kp] refers to the integer part of kp. Another exemplary method is also the same as Figure 3, In addition to blocks 300 and 301, this becomes block 400, which represents a program that is scheduled to wait for a period of time based on the history of the collision. In the method described with reference to Figure 3, a single communication terminal has the opportunity to enter more than one. The channel of the channel has a state. In high-order terms, if a collision occurs when the existing data stream is not inferred recently, the waiting program for the block 400 is waiting for one. Short time. If the recent inference has a collision, the waiting time will be increased, and if more recent inferences have more collisions, the waiting time will increase further. In some examples, the increase in waiting time can be reached. A specific maximum value. The relationship between the waiting time and the inferred collision history can be any suitable relationship, such as linearity, or index ' or other specific 18 200901683 relationship. The implementation of the waiting time can be as above Method, based on a random selection of a particular channel selection attempt probability. In this way, the method associated with Figure 4 enables simultaneous "owning" of more than one channel, but according to historical records, the communication terminal must give up trying to own An example of the method of Figure 4 will disclose below that the communication terminal i maintains its own value in ar new initialization to amax, and in each time slot, attempts a new channel. If successful, it will be α; Set to ctmax' and connect 4. If this attempt causes a collision to occur, the communication terminal i compares the value of the oti. :ai/2 or amin. The communication terminal i has and has a collision encounter channel, the probability of which is constant and this is determined by the communication terminal to the other channels in the method of Figure 3 and Figure 4, a communication At the point, there can be more than one channel, which ensures that the number of "owners" in each communication terminal is on the other hand, and it can also make a difference here, so that terminals (such as those top-level services) can be compared to those in the economy. The level has a larger number of channels. The implementation of the method described in this example is obtained by the IEEE 802. il wireless MAC protocol, wherein the request for send/clear to send mechanism may be the third The second result is a channel on the collision history inferred by a communication terminal. The terminal i takes ai to obtain the channel by the probability CM. Reset to the following two and give up the probability P that it has. Terminals can also be equal channels at the same time. The communication of some communication services is finally modified by the priority of the standard. The RTS/CTS: is dropped. If the collision 19 200901683

避免機制無法在此使用’則前述方式是較佳 這並不是必然的’若是通訊節點1 〇 3能夠實 制’則就能夠使用RTS/CTS機制。這樣的情 標準IEEE 8 02.1 1,本發明的差別就是「擁有 終端與「新來者」之間的不對稱。在IEE]E 一者嘗試存取通道的機率是相等的,較之於 方法中,二者嘗試存取通道的機率不同,上 然與標準IEEE8〇2.U在這點上明顯不同。 另一示例性系统 第5圖係另一個通訊網路的示意圖,在 法可以在其中實施。第5圖與第!圖相同, 為B的基地台,以及基地台1〇2被標示為a 地台A與B’ #能夠與第5圖中的虛線所指 1 〇 3進行通訊。The avoidance mechanism cannot be used here. The foregoing method is preferable. This is not inevitable. If the communication node 1 〇 3 can be implemented, the RTS/CTS mechanism can be used. Such a standard of IEEE 8 02.1 1, the difference of the present invention is "the asymmetry between the possession terminal and the "newcomer." In IEE], the probability of one attempting to access the channel is equal. Compared with the method, the probability of the two trying to access the channel is different, which is obviously different from the standard IEEE8〇2.U. Another exemplary system Figure 5 is a schematic diagram of another communication network in which the method can be implemented. Figure 5 and the first! Similarly, the base station B and the base station 1〇2 are labeled as a platform A and B' # can communicate with the dotted line 1 〇 3 in Fig. 5.

此處所描述的古I 砍的方法也可以被用於下行 的情況,例如當第5 Β由 每示)圖中的基地台Α與Β 載到相同的通訊終端】^ ^ % 103。在這種狀況中 都執行第2圖所诚古1 ^迷方法,以傳送封包流丨 端。基地台也可以法丨 M利用第3圖與第4圖的 包流的封包到通訊終端。 在此所描述的方法中 所選定的α以及 以是與通訊鏈接利 關。響應性是有關 才獲取到通道的— 用率和響應性二者之間 於—個新的封包流進入系 個指示°為了要將通訊鏈 實施例。然而 施碰撞避免機 況下,相較於 」通道的通訊 802.11 中,此 上述所提出的 述所提方法顯 此所揭露的方 除了多了標示 .。圖式中的基 示的通訊終端 I 路(downlink) 要將封包流下 基地台A與B 封包到通訊終 法,以傳送封 p的機率,可 的取捨權衡有 統之後,多久 接利用率最大 20 200901683 化,一般而言α與p都被選定為小的數值。為了要將 性最大化,一般而言α與p都被選定為大的數值。藉 α與ρ選取為非零並且小的數值,可能還是可以獲得 利用率和令人滿意的響應性。而後者的一個態樣是良 短程公平性(其中公平性’’fairness”是關於通訊終端之 通道之分佈)。例如對於輕度負載網路,其負載低於 者,其通道釋放機率P可以大約設在p = 〇.l,並且通 f.x 定嘗試機率α大約設定在α = 0.5。如果在中等負載的潍 C / 負載大約在75%的例子中,ρ可以設為ρ = 0·05而α可 為 α = 0.2。 示例性通訊網路節點 第6圖顯示的是適合用於實施此處所描述的方法 訊網路節點6 0 0之示意圖,舉例言之,通訊網路節點 是例如行動電話、個人數位助理、膝上型電腦、個人 或諸如此類的通訊終端。它在通訊網路中,也可以是 台或其他網路節點。其至少包含被用來以任何適當的 Q 連結到通訊網路的通訊鏈接 601,前述連結方式可以 如,利用無線鏈接或是實體鏈接。此通訊網路節點可 含其他沒有在此顯示出來的配件,因為對傳統通訊終 基地台以及諸如此類者而言,那些都是習知技術所提 配合使用者,為了清楚述明本揭露的技術起見,並沒 所有細節一一描述。 通訊網路節點6 0 0也至少包含使用者介面6 0 2, 以是鍵盤(或袖珍鍵盤)和顯示螢幕或其他適合種類的 響應 由將 尚的 好的 間的 5 0% 道選 路, 以設 的通 可以 電腦 基地 方式 是例 以包 端、 供而 有此 其可 使用 21 200901683 者介面。所提供的處理器604可以是任何適當種類者,例 如微處理器、電腦或是其他處理器。所提供的資料輸入 603,是用來使要被傳送的資料檔案或其他資訊,能夠被輸 入到節點600。協定堆疊(protocol stack)605被顯示出來以 指出節點是被安排來運轉通訊協定組(communication protocol suite) ’而且也提供任何適當種類的記憶體606。 示例性運算裝置 第7圖顯示運算基礎設備700的示例之各個配件,其 中運算基礎設備700可以任何形式的運算及/或電子設備 來實施’並且可以實施在本發明的通訊網路節點之中。 此運算基礎設備700至少包含一個或一個以上的輸入 7 04,其乃為任何適合於接收媒體内容的類型、網際網路協 定(Internet Protocol)、資料檔案、影像或其他輸入。此設 備也至少包含通訊介面708以作為任何適當種類的通訊網 路的介面之用。例如’無線存取通訊網路、網際網路或任 何封包為基礎的通訊網路。The method of the ancient I cut described here can also be used in the downlink case, for example, when the fifth stage is carried by the base station and the port in the figure to the same communication terminal] ^ ^ % 103. In this case, the method of Figure 2 is used to transmit the packet flow end. The base station can also use the packet of the packet stream of Figures 3 and 4 to the communication terminal. The alpha and the selected ones in the method described herein are related to the communication link. Responsiveness is related to the acquisition of the channel - between the usage rate and the responsiveness - a new packet flow entry indication. In order to implement the communication chain embodiment. However, in the case of collision avoidance, the method proposed by the above mentioned method in the above-mentioned communication 802.11 shows that the disclosed method is not limited. In the figure, the communication terminal I (downlink) of the base station should packetize the base stations A and B to the communication end method to transmit the probability of the seal p. After the balance is available, how long is the maximum utilization rate 20 200901683, in general, both α and p are selected as small values. In order to maximize sex, both α and p are generally chosen to be large values. By choosing α and ρ as non-zero and small values, it is possible to obtain utilization and satisfactory responsiveness. One aspect of the latter is good short-range fairness (where fairness ''fairness' is about the distribution of channels of communication terminals). For example, for a lightly loaded network, whose load is lower than that, the channel release probability P can be approximately Set at p = 〇.l, and pass the fx test probability α is set to approximately α = 0.5. If the medium load 潍C / load is approximately 75%, ρ can be set to ρ = 0·05 and α It can be α = 0.2. Figure 6 of the exemplary communication network node shows a schematic diagram suitable for implementing the method network node 600 described herein, for example, the communication network node is, for example, a mobile phone, a personal digital An assistant, laptop, personal or the like. It may be a communication network, or a station or other network node. It contains at least a communication link 601 that is used to connect to the communication network with any suitable Q. The foregoing connection method may be, for example, using a wireless link or a physical link. The communication network node may include other accessories not shown here because of the traditional communication base station and For the sake of this, those skilled in the art are provided by the prior art. For the sake of clarity of the technical disclosure, not all the details are described. The communication network node 600 also includes at least the user interface 6 0 2, so that the keyboard (or pocket keyboard) and the display screen or other suitable kind of response are selected by the 50% channel of the good room, the way to set up the computer base is to end the package. And there is a 21 200901683 interface that can be used. The processor 604 provided can be any suitable type, such as a microprocessor, computer or other processor. The data input 603 provided is used to be transmitted. The profile or other information can be entered into node 600. A protocol stack 605 is displayed to indicate that the node is scheduled to operate a communication protocol suite' and also provides any suitable type of memory. 606. Exemplary Computing Apparatus FIG. 7 shows various components of an example of computing infrastructure 700, wherein computing infrastructure 700 can be any shape The computing and/or electronic device is implemented 'and may be implemented in the communication network node of the present invention. The computing infrastructure device 700 includes at least one or more inputs 74, which are any type suitable for receiving media content. Internet Protocol, data file, video or other input. The device also includes at least a communication interface 708 for use as an interface for any suitable type of communication network, such as 'wireless access communication network, internet Or any packet-based communication network.

封包。平台軟體(platform softwar ’並依據特定通訊協定進而傳送 S〇ftWare)至少包含作業系統702 或其他任何適合的平台軟體而可以用在運算基礎設備,藉 以使得應用程式軟體7 〇 5能夠在設備上執行者。Packet. The platform software (platform softwar 'and further transmits S〇 ftWare according to a specific protocol) includes at least the operating system 702 or any other suitable platform software that can be used in the computing infrastructure so that the application software 7 〇 5 can be executed on the device. By.

22 200901683 媒體(例如記憶體7 〇 3)來提供。此處的記憶體可以是任何 適當的種類,例如隨機存取記憶體(Ramd〇m Access Memory: RAM)、任何種類的碟儲存設備(例如磁性材料或 光學儲存設備、硬碟機、CD、DVD或其他碟驅動器)。另 外,也可以使用快閃記憶體(flash memory)、可抹除可編程 唯讀記憶體(Erasable Programmable Read-Only Memory: EPROM)或電可抹除可編程唯讀記憶體(Electrically Erasable Programmable Read-Only Memory: EEPROM) 〇 C ) 也可以提供輸出7 0 7,例如音訊及/或視訊輸出,到與 運算基礎設備有整合或通訊的顯示系統。此顯示設備可以 提供圖形使用者介面或其他任何適合的種類之使用者介面 7 0 6 ’雖然這並不是必須的。 此揭露中所使用的「電腦」一詞,指的是任何具有處 理能力的設備’使能執行指令者。熟知該項技術者都能夠 認知到’前述的處理能力是可以整合入很多種不同設備 的’並且因此前述的「電腦」一詞’至少包含個人電腦、 〇 飼服器、行動電話、個人數位助理以及很多其他種類的設 備。 此揭露所說明的方法,可以用機器可讀而在儲存媒體 上的軟體來執行。此軟體可以適用於平行處理器(parallel Pr〇CeSS〇r)或串行處理器(serial processor)來執行,使得方 法的各步驟’可以被以任何適當的次序或是同時地執行。 此認知到’敕體可以是有價值的’可分離交易的物品, 而且本揭露的實質上,也包含軟體’其控制或執行 23 200901683 在,’dumb”或標準硬體上,藉以實施所欲達到的功能。本揭 露也要包含”描述”或定義硬體組態的軟體,例如硬體描述 語言(Hardware DeSCripti〇n Language: HDL)軟體而常用於 石夕晶片設計者’或用於通用可程式晶片組態,以實施所要 達成的功能。22 200901683 Media (eg memory 7 〇 3) to provide. The memory here may be any suitable type, such as random access memory (RAM), any kind of disc storage device (such as magnetic material or optical storage device, hard disk drive, CD, DVD). Or other disc drive). In addition, you can also use flash memory, Erasable Programmable Read-Only Memory (EPROM) or electrically erasable programmable read-only memory (Electrically Erasable Programmable Read- Only Memory: EEPROM) 〇C) It is also possible to provide output 7 0 7, such as audio and/or video output, to a display system that integrates or communicates with the computing infrastructure. The display device can provide a graphical user interface or any other suitable type of user interface 7 0 6 ' although this is not required. The term "computer" as used in this disclosure refers to any device capable of processing the ability to enable the execution of instructions. Those skilled in the art will recognize that 'the aforementioned processing power can be integrated into many different devices' and thus the term "computer" as mentioned above includes at least a personal computer, a feeding device, a mobile phone, and a personal digital assistant. And many other kinds of equipment. The method disclosed herein can be performed by machine readable software on a storage medium. This software can be implemented for parallel processors (parallel Pr〇CeSS〇r) or serial processors, so that the steps of the method can be performed in any suitable order or simultaneously. It is recognized that the 'corps can be a valuable 'separable transaction', and the essence of the disclosure also includes the software's control or execution 23 200901683 on the 'dumb' or standard hardware to implement the desired Achieved functionality. This disclosure also includes "description" or software that defines the hardware configuration, such as Hardware DeSCripti〇n Language (HDL) software, which is commonly used in Shixi chip designers' or for general purpose Program chip configuration to implement the functions to be achieved.

(J 熟知該項技藝者對於用來儲存程式指令的儲存設備, 可以認知到其可以是分散在整個網路的。例如遠端電腦可 .以储存被描述為軟體的程序之一個例子。—個區域或終端 電腦可以存取該遠端電腦,並下載該軟體的一部分或全 硝,以執行該程式。另一方面,區域電腦可以下載其所需 要的軟體之一部分’或者在該區域終端上執行一些軟體指 ?’並且也在遠端電腦(或電腦網路)上執行一些軟體指 令。那些熟知該項技藝者,藉由利用一般習知技術所了解 的傳統技術’也會體認到該軟體的全部或依部分指令,可 从藉由專屬電路(dedicated circuit),例如、可程式邏 輯陣列(programmable logic array)或諸如此類者而實施。 任何在此所給定的範圍或設備值,—如熟知該項技藝 者所明顯易見,都可以被擴展或改變,而不會喪失所尋求 的效果。 可以了解’上面所插述 依據本發明所揭露的一個實 以被更近一步了解的是,當 是一個或更多個該項目》 的效益或優點,可以被關連到 施例或是數個實施例。甚至可 參照到”一個,,項目時指的可以 在此所描述的方法之步驟 可被以枉何適當的順序執 24 200901683 行,或設若適當的話也可以同時執行。此外,所揭露的任 何方法中之各個個別的步驟方塊,也可以加以移除,也不 會脫離本揭露所描述標地之精神與範圍。(J is well acquainted with the storage device used to store program instructions, and it can be recognized that it can be distributed throughout the network. For example, a remote computer can store an example of a program that is described as software. The regional or terminal computer can access the remote computer and download a part or all of the software to execute the program. On the other hand, the regional computer can download one of the required software parts or perform on the terminal in the area. Some software refers to 'and also performs some software instructions on the remote computer (or computer network). Those who are familiar with the art, will also recognize the software by using the traditional techniques known from the conventional techniques. All or part of the instructions may be implemented by a dedicated circuit, such as a programmable logic array or the like. Any range or device value given herein, as is well known The artist is clearly visible and can be expanded or changed without losing the effect sought. In accordance with one aspect of the present invention, it is further understood that the benefits or advantages of one or more of the items can be related to a particular embodiment or a plurality of embodiments. In the case of a project, the steps of the method described herein may be performed in any suitable order, or may be performed simultaneously, if appropriate. In addition, each of the disclosed methods may be The step blocks can also be removed without departing from the spirit and scope of the subject matter described in the disclosure.

可了解的是,本揭露於上面所描述的任何實施例,其 給定只是用於舉例說明,並且任何習知該項技術者都能作 不同程度的修改,但仍于脫本發明的精神與範圍。上述的 說明書、示例以及資料,都提供了本發明的解說性實施例 的使用與結構之完整描述。雖然本發明的各個不同之實施 例已經在上面内容伴隨著一定程度的特定性,或是參照到 一個或一個以上的個別實施例揭露,熟知該項習知技術者 參照既有技術與本揭露的各實施例就可以做出各種不同的 改變而不脫本發明的精神與範圍。 【圖式簡單說明】 上文的實施方式配合附圖,將更能了解本發明所敘述 的内容,其中: Q 第1圖為通訊網路的示意圖; 第2圖為選擇一個通道並且在該通道上傳輸資料封包 的方法之示例的流程圖; 第3圖為選擇複數通道並且在該複數通道上傳輸資料 封包的方法之示例的流程圖; 第4圖為選擇一個通道並且在該通道上傳輸資料封包 的方法之另一個示例的流程圖; 第5圖為另一個通訊網路的示意圖; 25 200901683 第6圖為通訊網路節點(η 〇 d e )的一個示意圖;以及 第7圖例示以電腦為基礎的設備,其可以讓選擇通道 以及傳輸資料封包的方法之實施例藉此實施。 相同的元件符號係用來指定附圖中之相同的元件。 【主要元件符號說明】 6 0 0通訊網路節點 6 0 1通訊鍵接 602使用者介面 603資料輪入 604處理器 605協定堆疊 606記憶體 700運算基礎設備 701處理器 702作業系統 703記憶體 704輸入 705應用程式軟體 706使用者介面 707輸出 708通訊介面 26It can be appreciated that any embodiment described above is provided for illustration only, and any one skilled in the art can make various modifications, but still deviate from the spirit of the invention. range. The above description, examples and materials are provided to provide a complete description of the use and structure of the illustrative embodiments of the invention. Although various embodiments of the present invention have been described above with a certain degree of specificity, or are disclosed with reference to one or more individual embodiments, those skilled in the art are referred to the prior art and the present disclosure. Various changes may be made to the various embodiments without departing from the spirit and scope of the invention. BRIEF DESCRIPTION OF THE DRAWINGS The above embodiments will be better understood with reference to the accompanying drawings, in which: FIG. 1 is a schematic diagram of a communication network; FIG. 2 is a channel selected and on the channel A flowchart of an example of a method of transmitting a data packet; FIG. 3 is a flow chart showing an example of a method of selecting a complex channel and transmitting a data packet on the complex channel; FIG. 4 is a process of selecting a channel and transmitting a data packet on the channel A flow chart of another example of the method; Figure 5 is a schematic diagram of another communication network; 25 200901683 Figure 6 is a schematic diagram of a communication network node (η 〇de ); and Figure 7 illustrates a computer-based device An embodiment of the method of selecting a channel and transmitting a data packet can be implemented thereby. The same element symbols are used to designate the same elements in the drawings. [Main component symbol description] 600 communication network node 6 0 1 communication key interface 602 user interface 603 data wheel 604 processor 605 agreement stack 606 memory 700 computing infrastructure 701 processor 702 operating system 703 memory 704 input 705 application software 706 user interface 707 output 708 communication interface 26

Claims (1)

200901683 十、申請專利範圍: 1. 一種方法,至少包含下列步驟: 選定複數通道之一者,以於該通道送出資料封包的集 合中的一資料封包,該集合至少包含複數資料封包; 於該選定通道上,傳送該資料封包,並等待一第一確 認訊息, 若接收到一第一確認訊息,繼續使用該選定通道來傳 〇 送來自該集合的封包,並在送出每一封包之後,等待接收 一第二確認訊息;以及 若在送出該等封包之一者之後沒有接收到該第二確認 訊息,則依據一特定通道釋放機率,放棄該選定通道。 2. 如申請專利範圍第1項所述之方法,其中來自該資料封 包的集合之資料一起形成一資料檔案。 I) 3.如申請專利範圍第1項所述之方法,其係作為一通訊協 定的部份來執行,該通訊協定並沒有提供通道碰撞避免機 制。 4.如申請專利範圍第1項所述之方法,更包含下列步驟: 若沒有接收到該第一確認訊號,則在一實質上隨機等待時 期之後,依據一通道選定嘗試機率,重複上述選定一通道 之步驟。 27 200901683 5 .如申請專利範圍第4項所述之方法,其中該通道釋放機 率大約為0.05,而該通道選定嘗試機率大約為0.2。 6.如申請專利範圍第1項所述之方法,更包含下列步驟: 重複該選定複數通道中之一者的步驟,以選定一第二通 道,並且繼續利用該選定通道以及該第二選定通道來傳送 Γ) 來自該集合的封包。 7 ·如申請專利範圍第6項所述之方法,更包含下列步驟: 重複上述選定複數通道之一者的步驟,以選出後續通道; 以及繼續利用所有該等選定通道,以傳送來自該集合的封 包。 8. 如申請專利範圍第6項所述之方法,其中對於每一被使 〇 用的通道,選定每一通道的步驟係以通道選定嘗試機率為 基礎,該通道選.定嘗試機率係被獨立地選取,並且被用來 實施一隨機等待時間。 9. 如申請專利範圍第8項所述之方法,其中該通道選定嘗 試機率之值的選定係依據相關於碰撞歷史記錄的資訊。 1 0.如申請專利範圍第8項所述之方法,其中在接收到一 28 200901683 第一確認訊號之後,該通道選定嘗試機率會提高;並且在 一特定時限之後若仍收不到該第一確認訊號,則該通道選 定嘗試機率會降低一特定值。 11.如申請專利範圍第10項所述之方法,其中該通道選定 嘗試機率的增加不會超過一最大值,該通道選定嘗試機率 的降低也不會超過一最小值。 Ο 12 ·如申請專利範圍第1項所述之方法,其係作為一通訊 協定的部份來執行,該通訊協定係位在一通訊協定組的媒 體存取控制層(Medium Access Control Layer)。 1 3.如申請專利範圍第1項所述之方法,其係在無線存取 通訊網路通訊網路中的通訊終端中執行。 Q 1 4.如申請專利範圍第1項所述之方法,其係作為一通訊 協定的部份來執行,該通訊協定藉由分頻方法(frequency division process)而提供該複數通道。 15.如申請專利範圍第1項所述之方法,其係作為一通訊 協定的部份來執行,該通訊協定依據特定且固定的時期, 提供可以同步模式運作的複數通道。 29 200901683 16. —種方法,至少包含下列步驟: 選定複數通道之一者,以於該通道上送出複數資料封 包的一集合中的一資料封包,該集合至少包含複數資料封 包; 在該選定通道上傳送該資料封包,並繼續使用該選定 通道以傳送來自該集合的封包; 在傳送每一封包後,等待一確認訊息;以及 若在傳送出該等封包之一者後,沒接收到該確認訊 息,則依據一特定通道釋放機率,放棄該選定通道, 該方法係作為一通訊協定的部份來執行,該通訊協定 並沒有提供碰撞避免能力。200901683 X. Patent application scope: 1. A method comprising at least the following steps: selecting one of a plurality of channels to send a data packet in a set of data packets to the channel, the set comprising at least a plurality of data packets; On the channel, the data packet is transmitted, and a first confirmation message is awaited. If a first confirmation message is received, the selected channel is continuously used to transmit the packet from the set, and after each packet is sent, waiting to be received. a second confirmation message; and if the second confirmation message is not received after the one of the packets is sent, the selected channel is discarded according to a specific channel release probability. 2. The method of claim 1, wherein the data from the collection of the data package together form a data file. I) 3. The method of claim 1 is implemented as part of a communication protocol that does not provide a channel collision avoidance mechanism. 4. The method of claim 1, further comprising the steps of: if the first confirmation signal is not received, repeating the selected one according to a channel selected attempt probability after a substantially random waiting period The steps of the channel. The method of claim 4, wherein the channel release probability is about 0.05 and the channel has a selected probability of about 0.2. 6. The method of claim 1, further comprising the steps of: repeating one of the selected plurality of channels to select a second channel and continuing to utilize the selected channel and the second selected channel To transfer Γ) packets from this collection. 7. The method of claim 6, further comprising the steps of: repeating the step of selecting one of the plurality of channels selected to select a subsequent channel; and continuing to utilize all of the selected channels to transmit from the set Packet. 8. The method of claim 6, wherein for each channel to be used, the step of selecting each channel is based on a channel selection attempt rate, and the channel selection probability is independent. Grounded and used to implement a random wait time. 9. The method of claim 8, wherein the selection of the value of the channel selection trial probability is based on information relating to the collision history. The method of claim 8, wherein after receiving a 28 200901683 first confirmation signal, the probability of the channel selection attempt is increased; and if the first time limit is still not received after the specified time limit If the signal is confirmed, the probability of the selected channel selection will decrease by a specific value. 11. The method of claim 10, wherein the increase in the probability of selection of the channel selection does not exceed a maximum value, and the decrease in the probability of selection of the channel selection does not exceed a minimum value. Ο 12 • The method of claim 1, wherein the method is implemented as part of a communication protocol that is located in a Medium Access Control Layer of a communication protocol group. 1 3. The method of claim 1, wherein the method is performed in a communication terminal in a wireless access communication network communication network. Q 1 4. The method of claim 1, wherein the method is performed as part of a communication protocol that provides the complex channel by a frequency division process. 15. The method of claim 1, wherein the method is performed as part of a communication protocol that provides a plurality of channels operable in a synchronous mode based on a particular and fixed period of time. 29 200901683 16. A method comprising the steps of: selecting one of a plurality of channels to send a data packet in a set of complex data packets on the channel, the set comprising at least a plurality of data packets; Transmitting the data packet and continuing to use the selected channel to transmit the packet from the collection; waiting for a confirmation message after transmitting each packet; and not receiving the confirmation after transmitting one of the packets The message is discarded based on a particular channel release probability. The method is performed as part of a communication protocol that does not provide collision avoidance capabilities. 1 7.如申請專利範圍第16項所述之方法,更包含下列步 驟:重複上述選定複數通道之一者的步驟,以選定一第二 通道,並且繼續利用該選定通道以及該第二選定通道來傳 送來自該集合的封包。 1 8 . —種通訊網路節點,至少包含: 一處理器,其經配置以用於選定複數通道之一者,以 於該通道上送出複數資料封包的一集合中的一資料封包, 該集合至少包含複數資料封包;以及 一傳送器,其經配置以在該選定該通道上傳送該資料 封包,並等待接收一第一確認訊息; 30 200901683 其中該傳送器係經配置以使得若接收到一第一確認訊 息,則繼續使用該選定通道來傳送來自該集合的封包,並 在送出每一封包之後,等待一第二確認訊息; 並且該傳送器係經配置以使得若在送出該等封包之一 者之後沒有接收到該第二確認訊息,則依據一特定通道釋 放嘗試機率,放棄該選定通道。The method of claim 16, further comprising the step of repeating one of the selected plurality of channels to select a second channel and continuing to utilize the selected channel and the second selected channel To send packets from this collection. The communication network node includes at least: a processor configured to select one of the plurality of channels to send a data packet in a set of the plurality of data packets on the channel, the set being at least A plurality of data packets are included; and a transmitter configured to transmit the data packet on the selected channel and to wait to receive a first acknowledgement message; 30 200901683 wherein the transmitter is configured such that if a a confirmation message, continuing to use the selected channel to transmit packets from the set, and waiting for a second confirmation message after each packet is sent; and the transmitter is configured such that if one of the packets is sent After the second confirmation message is not received, the selected channel is discarded according to a specific channel release attempt probability. 1 9.如申請專利範圍第1 8項所述之通訊網路節點,其中該 處理器及該傳送器係經配置以隨著一通訊協定而動作,該 通訊協定並沒有提供通道碰撞避免機制。 20.如申請專利範圍第1 8項所述之通訊網路節點,其中該 處理器被安排來依據關於碰撞歷史記錄的資訊,動態選擇 該通道選定嘗試機率。1 9. The communication network node of claim 18, wherein the processor and the transmitter are configured to operate with a communication protocol that does not provide a channel collision avoidance mechanism. 20. The communication network node of claim 18, wherein the processor is arranged to dynamically select the channel selected attempt probability based on information regarding the collision history. 3131
TW097108174A 2007-03-08 2008-03-07 Multi-channel communications protocol TW200901683A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/683,861 US20080219285A1 (en) 2007-03-08 2007-03-08 Multi-Channel Communications Protocol

Publications (1)

Publication Number Publication Date
TW200901683A true TW200901683A (en) 2009-01-01

Family

ID=39738846

Family Applications (1)

Application Number Title Priority Date Filing Date
TW097108174A TW200901683A (en) 2007-03-08 2008-03-07 Multi-channel communications protocol

Country Status (3)

Country Link
US (1) US20080219285A1 (en)
TW (1) TW200901683A (en)
WO (1) WO2008109879A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8553744B2 (en) * 2009-01-06 2013-10-08 Qualcomm Incorporated Pulse arbitration for network communications
JP5332840B2 (en) 2009-04-08 2013-11-06 ソニー株式会社 Wireless communication apparatus, wireless communication system, wireless communication method, and program

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5960344A (en) * 1993-12-20 1999-09-28 Norand Corporation Local area network having multiple channel wireless access
US6542481B2 (en) * 1998-06-01 2003-04-01 Tantivy Communications, Inc. Dynamic bandwidth allocation for multiple access communication using session queues
US6577610B1 (en) * 1997-06-30 2003-06-10 Spacenet, Inc. Flex slotted Aloha transmission system and method
US6275476B1 (en) * 1998-02-19 2001-08-14 Micron Technology, Inc. Method of addressing messages and communications system
US6640248B1 (en) * 1998-07-10 2003-10-28 Malibu Networks, Inc. Application-aware, quality of service (QoS) sensitive, media access control (MAC) layer
US6594246B1 (en) * 1998-07-10 2003-07-15 Malibu Networks, Inc. IP-flow identification in a wireless point to multi-point transmission system
US6253082B1 (en) * 1998-07-30 2001-06-26 The Whitaker Corporation Method for selecting an alternate channel in a wireless communications system
US6418136B1 (en) * 1998-11-18 2002-07-09 Ramot University Authority For Applied Research And Industrial Development Ltd Announced dynamic access probability protocol for shared bandwidth networks
US7149193B2 (en) * 1999-12-15 2006-12-12 Nortel Networks Limited Dynamic, dual-mode wireless network architecture with a split layer 2 protocol
US20020019880A1 (en) * 2000-07-03 2002-02-14 Takashi Sakakura IP communication system for wireless terminal and communication method for wireless terminal
US20020075891A1 (en) * 2000-12-16 2002-06-20 Slim Souissi Network assisted random access method
US20030039226A1 (en) * 2001-08-24 2003-02-27 Kwak Joseph A. Physical layer automatic repeat request (ARQ)
KR100611032B1 (en) * 2002-03-13 2006-08-10 가부시키가이샤 엔티티 도코모 Mobile node, mobile communication system and communication control program
US7372832B2 (en) * 2003-02-12 2008-05-13 Nortel Networks Limited Channel selection
US7321762B2 (en) * 2003-03-26 2008-01-22 Conexant Systems, Inc. Mechanism for reserving multiple channels of a single medium access control and physical layer
KR100526182B1 (en) * 2003-05-30 2005-11-03 삼성전자주식회사 Method for Wireless Local Area Network Communication Using Multi Channel
KR100586845B1 (en) * 2003-06-24 2006-06-07 삼성전자주식회사 Method for enhancing transfer rate using DLP and multi-channel in DCF-based wireless LAN network, and wireless network system thereof
US20040264394A1 (en) * 2003-06-30 2004-12-30 Boris Ginzburg Method and apparatus for multi-channel wireless LAN architecture
US7372867B2 (en) * 2003-06-30 2008-05-13 Intel Corporation Method and apparatus to provide channel access parameter
US7525984B2 (en) * 2003-07-23 2009-04-28 Mediatek Inc. Method and apparatus for unifying MAC protocols
KR100526185B1 (en) * 2003-08-14 2005-11-03 삼성전자주식회사 Method And Apparatus for Enhancing Transfer Rate Using DLP And Multi-Channel In Wireless Lan Using PCF And DCF
EP1665677A1 (en) * 2003-09-23 2006-06-07 British Telecommunications Public Limited Company Decentralized channel selection in a self-organizing adhoc network
JP2006050519A (en) * 2003-10-24 2006-02-16 Sony Corp Wireless communications system, wireless communications apparatus, wireless communication method, and computer program
US9210719B2 (en) * 2003-11-19 2015-12-08 Koninklijke Philips N.V. Method for access to a medium by a multi-channel device
KR100572051B1 (en) * 2004-05-28 2006-04-18 주식회사 오픈솔루션 Apparatus and method for transmitting a wireless data
KR100606049B1 (en) * 2004-08-27 2006-07-28 삼성전자주식회사 Random Access Method for Multi-cell OFDMA Networks
JP4751394B2 (en) * 2004-08-31 2011-08-17 エイ・ティ・アンド・ティ・コーポレーション System and method for assigning channels in a wireless LAN
US7330457B2 (en) * 2004-10-07 2008-02-12 Polytechnic University Cooperative wireless communications
CN100477613C (en) * 2004-11-25 2009-04-08 都科摩(北京)通信技术研究中心有限公司 Distributed wireless access method and apparatus based on network distribution vector table
US7466676B2 (en) * 2004-11-30 2008-12-16 Stmicroelectronics Asia Pacific Pte. Ltd. Method and apparatus for multi-channel MAC protocol using multi-tone synchronous collision resolution
US7817609B2 (en) * 2006-03-27 2010-10-19 Ka Lun Eddie Law Multi-channel wireless networks

Also Published As

Publication number Publication date
US20080219285A1 (en) 2008-09-11
WO2008109879A1 (en) 2008-09-12

Similar Documents

Publication Publication Date Title
KR101213850B1 (en) Separating control and data in wireless networks
CN102474883B (en) In half random back method of wireless local network resource reservation
Sheu et al. A priority MAC protocol to support real-time traffic in ad hoc networks
US8213302B2 (en) Management of a wireless network
TWI433506B (en) Medium access control method and system
JP4251010B2 (en) Wireless communication system
TWI336576B (en) A scheduler system and method thereof
US8422450B2 (en) Relaxed deterministic back-off method for medium access control
JP2008109623A (en) Wireless communication system and method
TW201010321A (en) Systems and methods for providing a separate contention window allowing allocations for pending uplink SDMA transmission opportunities
TWM264760U (en) Wireless local area network (WLAN) components that utilize traffic prediction
JP2006013820A (en) Wireless communication system, wireless communication method, and wireless communication device
JP2004289836A (en) Medium-access control protocol hierarchical module and method for transmitting and receiving frame of medium-access control protocol hierarchical module of mobile terminal in mobile adhoc network
US9282440B2 (en) Wireless communication device, program, and communication control method
WO2006109213A1 (en) Communication system operating according to the carrier sense multiple access with collision detection (csma/cd) protocol
CN108370610A (en) Interference mitigation in dense grid network
WO2006106459A1 (en) A method of operating a network node of a communication network, a network node, a communication network, a computer-readable medium, and a program element
KR20060011447A (en) Medium access control apparatus for overlaying channels network
TW200931881A (en) Management of access to a medium
CN109644502A (en) A kind of point-to-multipoint method for channel allocation, apparatus and system
KR20110074872A (en) Selection of transmission lots of the relaxed deterministic back-off method in the medium access control
TW200901683A (en) Multi-channel communications protocol
JP2008035101A (en) Wireless communication apparatus and wireless communication method
Lu et al. A dynamic token passing MAC protocol for mobile ad hoc networks
KR101040290B1 (en) Wireless Network Systems with Priority Class Based Medium Access Control